-
1
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Y. Aumann, Y. Z. Ding, and M. O. Rabin, Everlasting security in the bounded storage model, IEEE Trans. on Information Theory, Vol. 48, pp. 1668-1680, 2002.
-
(2002)
IEEE Trans. on Information Theory
, vol.48
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
3
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, Generalized privacy amplification, IEEE Trans. on Information Theory, Vol. 41, No. 6, pp. 1915-1923, 1995.
-
(1995)
IEEE Trans. on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
4
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, Privacy amplification by public discussion, SIAM Journal on Computing, Vol. 17, pp. 210-229, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
5
-
-
0004013982
-
-
Ph. D. Thesis, ETH Zürich, Hartung-Gorre Verlag, Konstanz
-
C. Cachin, Entropy measures and unconditional security in cryptography, Ph. D. Thesis, ETH Zürich, Hartung-Gorre Verlag, Konstanz, 1997.
-
(1997)
Entropy Measures and Unconditional Security in Cryptography
-
-
Cachin, C.1
-
6
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár and J. Körner, Broadcast channels with confidential messages, IEEE Trans. on Information Theory, Vol. 24, pp. 339-348, 1978.
-
(1978)
IEEE Trans. on Information Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
8
-
-
0036040061
-
Tight security proofs for the bounded-storage model
-
S. Dziembowski and U. M. Maurer, Tight security proofs for the bounded-storage model, Proceedings of STOC 2002, pp. 341-350, 2002.
-
(2002)
Proceedings of STOC 2002
, pp. 341-350
-
-
Dziembowski, S.1
Maurer, U.M.2
-
10
-
-
85013455236
-
Codes for interactive authentication
-
Advances in Cryptology - CRYPTO '93, Springer-Verlag
-
P. Gemmell and M. Naor, Codes for interactive authentication, Advances in Cryptology - CRYPTO '93, LNCS, Vol. 773, pp. 355-367, Springer-Verlag, 1993.
-
(1993)
LNCS
, vol.773
, pp. 355-367
-
-
Gemmell, P.1
Naor, M.2
-
12
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. M. Maurer, Conditionally-perfect secrecy and a provably-secure randomized cipher, Journal of Cryptology, Vol. 5, No. 1, pp. 53-66, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.M.1
-
13
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Trans. on Information Theory, Vol. 39, No. 3, pp. 733-742, 1993.
-
(1993)
IEEE Trans. on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
14
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
Advances in Cryptology - CRYPTO '97, Springer-Verlag
-
U. M. Maurer and S. Wolf, Privacy amplification secure against active adversaries, Advances in Cryptology - CRYPTO '97, LNCS, Vol. 1294, pp. 307-321, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 307-321
-
-
Maurer, U.M.1
Wolf, S.2
-
15
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
-
U. M. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result, IEEE Trans. on Information Theory, Vol. 49, No. 4, pp. 822-831, 2003.
-
(2003)
IEEE Trans. on Information Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
16
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
-
U. M. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition, IEEE Trans. on Information Theory, Vol. 49, No. 4, pp. 832-838, 2003.
-
(2003)
IEEE Trans. on Information Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
17
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
-
U. M. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification, IEEE Trans. on Information Theory, Vol. 49, No. 4, pp. 839-851, 2003.
-
(2003)
IEEE Trans. on Information Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.M.1
Wolf, S.2
-
18
-
-
84977114496
-
On the impossibility of private key cryptography with weakly random keys
-
Advances in Cryptology - CRYPTO '90, Springer-Verlag
-
J. L. McInnes and B. Pinkas, On the impossibility of private key cryptography with weakly random keys, Advances in Cryptology - CRYPTO '90, LNCS, Vol. 537, pp. 421-436, Springer-Verlag, 1990.
-
(1990)
LNCS
, vol.537
, pp. 421-436
-
-
McInnes, J.L.1
Pinkas, B.2
-
19
-
-
0032629108
-
Extracting all the randomness and reducing the error in Trevisan's extractors
-
R. Raz, O. Reingold, and S. Vadhan, Extracting all the randomness and reducing the error in Trevisan's extractors, Proceedings of STOC '99, pp. 149-158, 1999.
-
(1999)
Proceedings of STOC '99
, pp. 149-158
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.3
-
20
-
-
0033316949
-
Error reduction for extractors
-
R. Raz, O. Reingold, and S. Vadhan, Error reduction for extractors, Proceedings of FOCS '99, pp. 191-201, 1999.
-
(1999)
Proceedings of FOCS '99
, pp. 191-201
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.3
-
21
-
-
84947270656
-
How to fool an unbounded adversary with a short key
-
Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag
-
A. Russell and H. Wang, How to fool an unbounded adversary with a short key, Advances in Cryptology - EUROCRYPT 2002, LNCS, Vol. 2332, pp. 133-148, . Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 133-148
-
-
Russell, A.1
Wang, H.2
-
22
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
23
-
-
71049183202
-
Universal hashing and authentication codes
-
Advances in Cryptology - CRYPTO '91, Springer-Verlag
-
D. R. Stinson, Universal hashing and authentication codes, Advances in Cryptology - CRYPTO '91, LNCS, Vol. 576, pp. 74-85, Springer-Verlag, 1992.
-
(1992)
LNCS
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
24
-
-
84947780088
-
Strong security against active attacks in information-theoretic secret-key agreement
-
Advances in Cryptology - ASIACRYPT '98, Springer-Verlag
-
S. Wolf, Strong security against active attacks in information-theoretic secret-key agreement, Advances in Cryptology - ASIACRYPT '98, LNCS, Vol. 1514, pp. 405-419, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 405-419
-
-
Wolf, S.1
-
26
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|